IJMTES – PACKET HIDING TECHNIQUE FOR PREVENTING THE DENIAL OF SERVICE ATTACK THROUGH CLUSTER BASED HOMOMORPHIC ENCRYPTION

Journal Title : International Journal of Modern Trends in Engineering and Science

Paper Title : PACKET HIDING TECHNIQUE FOR PREVENTING THE DENIAL OF SERVICE ATTACK THROUGH CLUSTER BASED HOMOMORPHIC ENCRYPTION

Author’s Name : T Kalaivani
unnamed

Volume 04 Issue 05 2017

ISSN no:  2348-3121

Page no: 127-129

Abstract – The open nature of the multihop wireless adhoc network leaves it vulnerable to packet loss through link error and packet dropping. The mitigating technique can be used for mounting the packet loss on the wireless adhoc network. Typically the detection process has been addressed under insider attack cases. Many existing work has carried out to answer these issues but reputation of the system fails due to manipulation of the data. Data integrity plays major problem in the reputation of the system against the data modification attacks. In this paper, we propose an attack resilient technique named as “Packet hiding technique for preventing the denial of service attack through cluster based homomorphic encryption”. The proposed technique exploits the knowledge of the communication context of transmission nodes in terms of the selfish and denying of service characteristics.

Keywords – Wireless Adhoc Network, Attack Resilience, Packet Dropping, Secure Routing, Multihop Wireless Network, Intentional interference

References

  1. L. Lazos, S. Liu, and M. Krunz, “Mitigating Control-Channel Jamming Attacks in Multi-Channel Ad Hoc Networks,” Proc.Second ACM Conf. Wireless Network Security, pp. 169-180, 2009.
  2. G. Lin and G. Noubir, “On Link Layer Denial of Service in Data Wireless LANs,” Wireless Comm. and Mobile Computing, vol. 5, no. 3, pp. 273-284, May 2004.
  3. S. Buchegger and J.-Y.LeBoudee, “Self-policing mobile ad hoc networks by reputation systems,” IEEE Commun. Mag., vol. 43, no. 7, pp. 101–107, Jul. 2005.
  4. E. Hern_andez-Orallo, M. D. Serrat, J.-C. Cano, C. M. T. Calafate, and P. Manzoni, “Improving selfish node detection in MANETs using a collaborative watchdog,” IEEE Comm. Lett., vol. 16, no. 5,pp. 642–645, May 2012.
  5. Meixing Le, AngelosStavrou, Brent ByungHoon Kang, “Double Guard: Detecting Intrusions in Multitier Web Applications” IEEE Transaction on Department and Secure Computing, Vol 9, No. 4, JULY/AUGUST 2012
  6. R. Rao and G. Kesidis, “Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited,” in Proc. IEEE GLOBECOM,Conf., 2003, pp. 2957–2961.
  7. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proc. 6th Annu. Intl. Conf. MobiCom, 2000, pp. 255–265.
  8. K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, “An acknowledgement- based approach for the detection of routing misbehavior in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2006.
  9. Y. Liu and Y. R. Yang, “Reputation propagation and agreement in mobile ad-hoc networks,” in Proc. IEEE WCNC Conf., 2003, pp. 1510–1515.
  10. W. Galuba, P. Papadimitratos, M. Poturalski, K. Aberer, Z. Despotovic, and W. Kellerer, “Castor: Scalable secure routing for ad hoc networks,” in Proc. IEEE INFOCOM, Mar. 2010, pp. 1 –9.
  11. K. Balakrishnan, J. Deng, and P. K. Varshney, “TWOACK: Preventing selfishness in mobile ad hoc networks,” in Proc. IEEE Wireless Commun. Netw. Conf., 2005, pp. 2137–2142.
  12. K. Liu, D. Pramod, K. Varshney, and K. Balakrishnan, “An Acknowledgement based approach for the detection of routing misbehavior in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2007.
  13. K. Vishnu and A. J Paul, “Detection and removal of cooperative black/gray hole attack in mobile ad hoc networks,” Int. J. Comput. Appl., vol. 1, no. 22, pp. 28–32, 2010.
  14. S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, “Prevention of cooperative blackhole attacks in wireless ad hoc networks,” in Proc. Int. Conf. Wireless Netw., Jun. 2003, pp. 570–575.
  15. H. Weerasinghe and H. Fu, “Preventing cooperative black hole attacks in mobile ad hoc networks: Simulation implementation and evaluation,” in Proc. IEEE ICC, 2007, pp. 362–367.
Scroll Up